2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits &Amp; Systems (DDECS) 2016
DOI: 10.1109/ddecs.2016.7482481
|View full text |Cite
|
Sign up to set email alerts
|

Efficient triggering of Trojan hardware logic

Abstract: The detection of malicious hardware logic (hardware Trojan) requires test patterns that succeed in exciting the malicious logic part. Testing of all possible input patterns is often prohibitively expensive. As an alternative, we explored previously the applicability of the combinatorial testing principles.In this paper, we turn our focus on the efficiency of this approach for triggering the hidden malicious logic. We present a series of experiments with Trojan designs of various activation patterns and lengths… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
18
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(19 citation statements)
references
References 21 publications
1
18
0
Order By: Relevance
“…As a result, non-destructive methods are needed to provide post-fabrication tests on all the production before deployment in the field. Related approaches are classified into sidechannel analysis [14][15][16][17][18][19], logic testing [20][21][22][23][24][25][26][27] and visual inspection [28] (not present in Fig. 2).…”
Section: ) Detectionmentioning
confidence: 99%
See 4 more Smart Citations
“…As a result, non-destructive methods are needed to provide post-fabrication tests on all the production before deployment in the field. Related approaches are classified into sidechannel analysis [14][15][16][17][18][19], logic testing [20][21][22][23][24][25][26][27] and visual inspection [28] (not present in Fig. 2).…”
Section: ) Detectionmentioning
confidence: 99%
“…Logic-testing methods are therefore dedicated to HTs that change the functionality of an IC. It is generally agreed that, in order to evade detection during manufacturing test, an attacker creates a HT that is dormant until a stealthy condition triggers it [20][21][22][23][24][25][26][27]. The goal of detections methods is then to be able to activate potential HTs within a reasonable test time, i.e.…”
Section: B) Logic Testingmentioning
confidence: 99%
See 3 more Smart Citations